0
0
Fork 1
Spiegel von https://github.com/paviliondev/discourse-custom-wizard.git synchronisiert 2024-11-23 09:50:28 +01:00
discourse-custom-wizard/spec/components/custom_wizard/subscription_spec.rb

126 Zeilen
4,3 KiB
Ruby

2021-09-07 14:06:13 +02:00
# frozen_string_literal: true
require_relative '../../plugin_helper'
2021-09-24 11:58:42 +02:00
describe CustomWizard::Subscription do
2021-09-07 14:06:13 +02:00
fab!(:user) { Fabricate(:user) }
2021-09-24 11:58:42 +02:00
it "initializes subscription authentication and subscription" do
subscription = described_class.new
expect(subscription.authentication.class).to eq(CustomWizard::Subscription::Authentication)
expect(subscription.subscription.class).to eq(CustomWizard::Subscription::Subscription)
2021-09-07 14:06:13 +02:00
end
it "returns authorized and subscribed states" do
2021-09-24 11:58:42 +02:00
subscription = described_class.new
expect(subscription.authorized?).to eq(false)
expect(subscription.subscribed?).to eq(false)
2021-09-07 14:06:13 +02:00
end
context "subscription" do
before do
2021-09-24 11:58:42 +02:00
@subscription = described_class.new
2021-09-07 14:06:13 +02:00
end
it "updates valid subscriptions" do
stub_subscription_request(200, valid_subscription)
2021-09-24 11:58:42 +02:00
expect(@subscription.update).to eq(true)
expect(@subscription.subscribed?).to eq(true)
2021-09-07 14:06:13 +02:00
end
it "handles invalid subscriptions" do
stub_subscription_request(200, invalid_subscription)
2021-09-24 11:58:42 +02:00
expect(@subscription.update).to eq(false)
expect(@subscription.subscribed?).to eq(false)
2021-09-07 14:06:13 +02:00
end
it "handles subscription http errors" do
stub_subscription_request(404, {})
2021-09-24 11:58:42 +02:00
expect(@subscription.update).to eq(false)
expect(@subscription.subscribed?).to eq(false)
2021-09-07 14:06:13 +02:00
end
it "destroys subscriptions" do
stub_subscription_request(200, valid_subscription)
2021-09-24 11:58:42 +02:00
expect(@subscription.update).to eq(true)
expect(@subscription.destroy_subscription).to eq(true)
expect(@subscription.subscribed?).to eq(false)
2021-09-07 14:06:13 +02:00
end
it "has class aliases" do
2021-09-24 11:58:42 +02:00
authenticate_subscription
2021-09-07 14:06:13 +02:00
stub_subscription_request(200, valid_subscription)
2021-09-24 11:58:42 +02:00
expect(described_class.update).to eq(true)
2021-09-07 14:06:13 +02:00
expect(described_class.subscribed?).to eq(true)
end
end
context "authentication" do
before do
2021-09-24 11:58:42 +02:00
@subscription = described_class.new
2021-09-07 14:06:13 +02:00
user.update!(admin: true)
end
it "generates a valid authentication request url" do
request_id = SecureRandom.hex(32)
2021-09-24 11:58:42 +02:00
uri = URI(@subscription.authentication_url(user.id, request_id))
expect(uri.host).to eq(@subscription.server)
2021-09-07 14:06:13 +02:00
parsed_query = Rack::Utils.parse_query uri.query
expect(parsed_query['public_key'].present?).to eq(true)
expect(parsed_query['nonce'].present?).to eq(true)
expect(parsed_query['client_id'].present?).to eq(true)
expect(parsed_query['auth_redirect'].present?).to eq(true)
expect(parsed_query['application_name']).to eq(SiteSetting.title)
2021-09-24 11:58:42 +02:00
expect(parsed_query['scopes']).to eq(@subscription.scope)
2021-09-07 14:06:13 +02:00
end
def generate_payload(request_id, user_id)
2021-09-24 11:58:42 +02:00
uri = URI(@subscription.authentication_url(user_id, request_id))
keys = @subscription.authentication.get_keys(request_id)
2021-09-07 14:06:13 +02:00
raw_payload = {
key: "12345",
nonce: keys.nonce,
push: false,
api: UserApiKeysController::AUTH_API_VERSION
}.to_json
public_key = OpenSSL::PKey::RSA.new(keys.pem)
Base64.encode64(public_key.public_encrypt(raw_payload))
end
it "handles authentication response if request and response is valid" do
request_id = SecureRandom.hex(32)
payload = generate_payload(request_id, user.id)
2021-09-24 11:58:42 +02:00
expect(@subscription.authentication_response(request_id, payload)).to eq(true)
expect(@subscription.authorized?).to eq(true)
2021-09-07 14:06:13 +02:00
end
it "discards authentication response if user who made request as not an admin" do
user.update!(admin: false)
request_id = SecureRandom.hex(32)
payload = generate_payload(request_id, user.id)
2021-09-24 11:58:42 +02:00
expect(@subscription.authentication_response(request_id, payload)).to eq(false)
expect(@subscription.authorized?).to eq(false)
2021-09-07 14:06:13 +02:00
end
it "discards authentication response if request_id is invalid" do
payload = generate_payload(SecureRandom.hex(32), user.id)
2021-09-24 11:58:42 +02:00
expect(@subscription.authentication_response(SecureRandom.hex(32), payload)).to eq(false)
expect(@subscription.authorized?).to eq(false)
2021-09-07 14:06:13 +02:00
end
it "destroys authentication" do
request_id = SecureRandom.hex(32)
payload = generate_payload(request_id, user.id)
2021-09-24 11:58:42 +02:00
@subscription.authentication_response(request_id, payload)
2021-09-07 14:06:13 +02:00
2021-09-24 11:58:42 +02:00
expect(@subscription.destroy_authentication).to eq(true)
expect(@subscription.authorized?).to eq(false)
2021-09-07 14:06:13 +02:00
end
end
2021-09-07 14:11:50 +02:00
end